A universally composable secure channel based on the KEM-DEM framework. For ISO standards on public-key encryption, Shoup introduced the framework of KEM (Key Encapsulation Mechanism), and DEM (Data Encapsulation Mechanism), for formalizing and realizing one-directional hybrid encryption; KEM is a formalization of asymmetric encryption specified for key distribution, and DEM is a formalization of symmetric encryption. This paper investigates a more general hybrid protocol, secure channel, using KEM and DEM, such that KEM is used for distribution of a session key and DEM, along with the session key, is used for multiple bi-directional encrypted transactions in a session. This paper shows that KEM semantically secure against adaptively chosen ciphertext attacks (IND-CCA2) and DEM semantically secure against adaptively chosen plaintext/ciphertext attacks (IND-P2-C2) along with secure signatures and ideal certification authority are sufficient to realize a universally composable (UC) secure channel. To obtain the main result, this paper also shows several equivalence results: UC KEM, IND-CCA2 KEM and NM-CCA2 (non-malleable against CCA2) KEM are equivalent, and UC DEM, IND-P2-C2 DEM and NM-P2-C2 DEM are equivalent.

References in zbMATH (referenced in 51 articles )

Showing results 1 to 20 of 51.
Sorted by year (citations)

1 2 3 next

  1. Fujisaki, Eiichiro; Okamoto, Tatsuaki: Secure integration of asymmetric and symmetric encryption schemes (2013)
  2. Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi: Certificateless hybrid signcryption (2013)
  3. Fujisaki, Eiichiro: New constructions of efficient simulation-sound commitments using encryption and their applications (2012)
  4. Libert, Beno{^i}t; Paterson, Kenneth G.; Quaglia, Elizabeth A.: Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model (2012)
  5. Naor, Moni; Segev, Gil: Public-key cryptosystems resilient to key leakage (2012)
  6. Yoneyama, Kazuki: One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary (2012)
  7. Paterson, Kenneth G.; Schuldt, Jacob C.N.; Stam, Martijn; Thomson, Susan: On the joint security of encryption and signature, revisited (2011)
  8. Abe, Masayuki; Cui, Yang; Imai, Hideki; Kiltz, Eike: Efficient hybrid encryption from ID-based encryption (2010)
  9. Desmedt, Yvo; Gennaro, Rosario; Kurosawa, Kaoru; Shoup, Victor: A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack (2010)
  10. Herranz, Javier; Hofheinz, Dennis; Kiltz, Eike: Some (in)sufficient conditions for secure hybrid encryption (2010)
  11. Kiltz, Eike; Mohassel, Payman; O’Neill, Adam: Adaptive trapdoor functions and chosen-ciphertext security (2010)
  12. Lai, Junzuo; Deng, Robert H.; Liu, Shengli; Kou, Weidong: Efficient CCA-secure PKE from identity-based techniques (2010)
  13. Long, Yu; Chen, Kefei: Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism (2010)
  14. Matsuda, Takahiro; Nakai, Yasumasa; Matsuura, Kanta: Efficient generic constructions of timed-release encryption with pre-open capability (2010)
  15. Wee, Hoeteck: Efficient chosen-ciphertext security via extractable hash proofs (2010)
  16. Yang, Guomin; Tan, Chik How; Huang, Qiong; Wong, Duncan S.: Probabilistic public key encryption with equality test (2010)
  17. Abe, Masayuki; Kiltz, Eike; Okamoto, Tatsuaki: Compact CCA-secure encryption for messages of arbitrary length (2009)
  18. Choi, Seung Geol; Herranz, Javier; Hofheinz, Dennis; Hwang, Jung Yeon; Kiltz, Eike; Lee, Dong Hoon; Yung, Moti: The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure (2009)
  19. Herrmann, Mathias; Leander, Gregor: A practical key recovery attack on basic TCHo (2009)
  20. Kiltz, Eike; Galindo, David: Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (2009)

1 2 3 next